Best infosec-related long reads for the week of 10/18/25
metacurity.com·2d
🛡Cybersecurity
Flag this post
How the CIA’s Kryptos Sculpture Gave Up Its Final Secret
scientificamerican.com·5d
🔐Cryptographic Archaeology
Flag this post
Shadow IT: The Haunting Inside Your Network
bitsight.com·4d
🔓Hacking
Flag this post
Beyond Benchmarks: Testing Open-Source LLMs in Multi-Agent Workflows
blog.scottlogic.com·22h
Performance Mythology
Flag this post
AI Parsing of Commercial Proposals: How to Accelerate Proposal Processing and Win Clients
hackernoon.com·13h
🌀Brotli Internals
Flag this post
Hacking Team successor linked to malware campaign, new ‘Dante’ commercial spyware
cyberscoop.com·5h
🎫Kerberos Exploitation
Flag this post
Hiding Processes from Ps or Top
rtvkiz.vercel.app·3d·
Discuss: Hacker News
📟Terminal Forensics
Flag this post
Infrastructure Should Be Inferred, Not Written (and LLMs Are Why)
ivan.codes·3h·
Discuss: Hacker News
🔒WASM Capabilities
Flag this post
Using a Security Key on X? Re-Enroll Now or Your Account Will Be Locked
pcmag.com·5h·
Discuss: Hacker News
🔓Password Cracking
Flag this post
Visibility at scale: How Figma detects sensitive data exposure
figma.com·4d·
Discuss: Hacker News
🌊Stream Processing
Flag this post
Automated Anomaly Detection in Cryo-EM Density Maps via Multi-Scale Fourier Analysis and Bayesian Calibration
dev.to·10h·
Discuss: DEV
📄Document Digitization
Flag this post
CXRAgent: Director-Orchestrated Multi-Stage Reasoning for Chest X-Ray Interpretation
arxiv.org·18h
Proof Automation
Flag this post
Unsplittable Cost Flows from Unweighted Error-Bounded Variants
arxiv.org·18h
🧮Algebraic Datatypes
Flag this post
Ransomware profits drop as victims stop paying hackers
bleepingcomputer.com·2h·
Discuss: Hacker News
🦠Malware Analysis
Flag this post
Excision Score: Evaluating Edits with Surgical Precision
arxiv.org·18h
⛏️File Carving
Flag this post
11 problems I have noticed building Agents (and fixes nobody talks about)
dev.to·11h·
Discuss: DEV
Proof Automation
Flag this post
Remember Your First Time (in Philosophy)?
cacm.acm.org·1h
🧮Theoretical Computer Science
Flag this post
Eight Steps to Digital Sovereignty
heise.de·1d
🖥️Self-hosted Infrastructure
Flag this post
TokenCLIP: Token-wise Prompt Learning for Zero-shot Anomaly Detection
arxiv.org·18h
🗜️LZW Variants
Flag this post
Morphologically Intelligent Perturbation Prediction with FORM
arxiv.org·18h
🌀Differential Geometry
Flag this post